Method and Apparatus for User Authentication and Security
First Claim
Patent Images
1. A computer implemented method comprising:
- authenticating a user using a first authentication process outside a vehicle;
authenticating the user using a second authentication process inside the vehicle; and
if either of the authentication processes fails to authenticate the user, providing an override authentication process inside the vehicle;
whereinif both authentication processes authenticate the user or if the override authentication process authenticates the user, full vehicle functionality is provided, whereinif either authentication process fails to authenticate the user and if the override authentication process fails to authenticate the user, limited vehicle functionality is provided.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer implemented method includes logging a GPS location in a wireless device responsive to a vehicle entering a parked state. The method also includes comparing device GPS coordinates to the logged GPS coordinates to determine if the device is in vehicle proximity, after the wireless device has moved a predetermined distance from the logged GPS location. The method additionally includes sending a signal to the vehicle to activate a user authentication process when the device is in vehicle proximity.
15 Citations
20 Claims
-
1. A computer implemented method comprising:
-
authenticating a user using a first authentication process outside a vehicle; authenticating the user using a second authentication process inside the vehicle; and if either of the authentication processes fails to authenticate the user, providing an override authentication process inside the vehicle;
whereinif both authentication processes authenticate the user or if the override authentication process authenticates the user, full vehicle functionality is provided, wherein if either authentication process fails to authenticate the user and if the override authentication process fails to authenticate the user, limited vehicle functionality is provided. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium, storing instructions that, when executed by a processor, cause the processor to perform a method comprising:
-
authenticating a user using a first authentication process outside a vehicle; authenticating the user using a second authentication process inside the vehicle; and if either of the authentication processes fails to authenticate the user, providing an override authentication process inside the vehicle;
whereinif both authentication processes authenticate the user or if the override authentication process authenticates the user, full vehicle functionality is provided, wherein if either authentication process fails to authenticate the user and if the override authentication process fails to authenticate the user, limited vehicle functionality is provided. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a processor configured to; authenticate a user using a first authentication process outside a vehicle; authenticate the user using a second authentication process inside the vehicle; and if either of the authentication processes fails to authenticate the user, provide an override authentication process inside the vehicle;
whereinif both authentication processes authenticate the user or if the override authentication process authenticates the user, the processor is configured to provide full vehicle functionality, wherein if either authentication process fails to authenticate the user and if the override authentication process fails to authenticate the user, the processor is configured to provide limited vehicle functionality. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification